Optimal Symmetric Ratcheting for Secure Communication
نویسندگان
چکیده
Abstract To mitigate state exposure threats to long-lived instant messaging sessions, ratcheting was introduced, which is used in practice protocols like Signal. However, existing generally come with a high cost. Recently, Caforio et al. proposed pragmatic constructions, compose weakly secure ‘light’ protocol and strongly ‘heavy’ protocol, order achieve so-called on-demand. The light they has still complexity. In this paper, we propose the lightest possible could imagine, essentially encrypts then hashes secret key. We prove it standard model by introducing new security notion, relates symmetric encryption key updates hashing. Our composes well generic transformation techniques offer performance at same time. second step, another based on newly defined integrated primitive, extending one-time authenticated an additional output block as for next message. instantiate primitive firstly from any associated data, efficient instantiation using advanced (AES) update AES-Galois/Counter mode of operation encrypt decrypt messages.
منابع مشابه
Distance-Aware Beamforming for Multiuser Secure Communication Systems
Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems) are possible alternatives to provide security for such applications. In this paper, we consid...
متن کاملSecure Communication in Shotgun Cellular Systems
In this paper, we analyze the secure connectivity in Shotgun cellular systems (SCS: Wireless communication systems with randomly placed base stations) by Poisson intrinsically secure communication graph (IS-graph), i.e., a random graph which describes the connections that are secure over a network. For a base-station in SCS, a degree of secure connections is determined over two channel models: ...
متن کاملUltra Low Power Symmetric Pass Gate Adiabatic Logic with CNTFET for Secure IoT Applications
With the advent and development of the Internet of Things, new needs arose and more attention was paid to these needs. These needs include: low power consumption, low area consumption, low supply voltage, higher security and so on. Many solutions have been proposed to improve each one of these needs. In this paper, we try to reduce the power consumption and enhance the security by using SPGAL, ...
متن کاملA Secure Certificate for Secure Group Communication
Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distribut...
متن کاملAnti-Synchronization of Complex Chaotic T-System Via Optimal Adaptive Sliding-Mode and Its Application In Secure Communication
In this paper, an optimal adaptive sliding mode controller is proposed for anti-synchronization of two identical hyperchaotic systems. We use hyperchaotic complex T-system for master and slave systems with unknown parameters in the slave system. To construct the optimal adaptive sliding mode controller, first a simple sliding surface is designed. Then, the optimal adaptive sliding mode controll...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Computer Journal
سال: 2022
ISSN: ['0010-4620', '1460-2067']
DOI: https://doi.org/10.1093/comjnl/bxab209